CN111131028B - Inter-domain route recovery method based on minimum spanning tree of degree constraint - Google Patents
Inter-domain route recovery method based on minimum spanning tree of degree constraint Download PDFInfo
- Publication number
- CN111131028B CN111131028B CN201910985081.8A CN201910985081A CN111131028B CN 111131028 B CN111131028 B CN 111131028B CN 201910985081 A CN201910985081 A CN 201910985081A CN 111131028 B CN111131028 B CN 111131028B
- Authority
- CN
- China
- Prior art keywords
- node
- tree
- constraint
- spanning tree
- degree
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an inter-domain route recovery method based on a minimum spanning tree with degree constraint, which is characterized in that an inter-domain route system subjected to BGP-LDoS attack is expressed as a spanning forest, and an inter-domain route recovery topology based on the minimum spanning tree with degree constraint is constructed under the condition of meeting the set degree constraint by utilizing algorithms such as a basic migration algorithm, a complex migration algorithm, a single-tree forest correction algorithm, a FT key node selection algorithm, a CT key node selection algorithm and the like; meanwhile, in the process of creating the minimum spanning tree with the orientation constraint, the node migration information during the topology generation can be recorded; the aggregation of the node degrees can be effectively controlled in the process of recovering the topology establishment, the generation of nodes with too high degrees is avoided, and the calculation complexity in the topology generation process is effectively reduced.
Description
The technical field is as follows:
the invention relates to the field of internet security, in particular to an inter-domain route recovery method based on a minimum spanning tree with degree constraint.
Background art:
with the rapid development of the internet, an Inter-domain routing system (Inter-domain routing system) is used as a key infrastructure of the internet, and the security protection pressure faced in recent years is gradually increased. Currently, the main threats of the inter-domain routing system mainly come from the routing Prefix hijacking (Prefix hijacking), the Route leakage (Route leak) and the Low-speed Denial of Service (BGP-LDoS). BGP-LDoS is better in terms of attack speed and intensity. BGP-LDoS attacks have been escalated in threat and complexity through the initial Shrow and FB-Shrow, to ZMW and CXPST, and to variant IHD, DNP and LAAEM.
The BGP-LDoS attack can cause the local to overall failure of the inter-domain routing system, the area range of intelligent network node deployment is continuously expanded along with the development of the Internet of things, the number of potential zombie networks available for an attacker is increased, and the BGP-LDoS attack with a large-scale zombie network as a basic attack condition can generate more profound threats to the inter-domain routing system.
The inter-domain routing system failure recovery aims to ensure communication between survival nodes after the network is attacked by using various routing recovery technologies. According to the different numbers of the nodes of the failure autonomous domain and the links between domains, the existing route failure recovery method can be divided into the route recovery based on single-chain/single-domain failure and the route recovery based on multi-chain/multi-domain failure. The Route recovery method based on single-chain/single-domain failure is represented by PS (Path distributing), BRAP (backup Route Routing protocol), Not-via and MFT2-BGP, is suitable for traditional DDoS attack or unexpected node/link failure, and is difficult to deal with a multipoint unrelated area failure scene caused by BGP-LDoS attack.
The recovery method based on multi-link/multi-domain failure is to implement dynamic switching of message forwarding paths aiming at nodes of surviving autonomous domains under the condition that a plurality of autonomous domain areas without adjacency relation are approximately and simultaneously in parallel to present a communication service interruption situation. RRL (resource Routing layers), 3R (build Route recovery), DLR (Dual Link failures recovery), CSES (Circuit Selecting by Edge software), and FCP (Failure-searching Packets) are taken as representatives. The multi-chain/multi-domain failure route recovery method has the problems of high computation complexity and storage space in the aspect of pre-computation backup subgraph generation, and more importantly, BGP-LDoS attacks take highly aggregated central nodes as attack targets, and existing RRL, MRC and other algorithms do not consider the control of node degrees in generated subgraphs, so that most backup subgraphs generated by the method in the face of BGP-LDoS attacks contain the characteristic of high-central-degree nodes, and the secondary survivability of the backup subgraphs is poor.
The invention content is as follows:
the technical problem to be solved by the invention is as follows: the method overcomes the defects of the prior art, aims at constructing the minimum spanning tree with the degree of constraint as the recovery topology, provides a basic migration algorithm, a complex migration algorithm, a single-tree forest correction algorithm, an FT key node selection algorithm and a CT key node selection algorithm, constructs a new recovery topology according to the survival topology of the attacked routing system under the condition of meeting the degree of constraint, effectively controls the problem of node aggregation while reducing the complexity of calculation of the generated recovery topology, and meets the requirement of an inter-domain routing recovery method based on the minimum spanning tree with the degree of constraint, which is superior in routing and prevents secondary attack.
The technical scheme of the invention is as follows: an inter-domain route recovery method based on a degree constraint minimum spanning tree is characterized in that: step one, establishing a mathematical model of a minimum spanning tree with degree constraint;
step two, based on Node Representation (NR), coding the inter-domain routing system subjected to BGP-LDoS attack, and representing the inter-domain routing system as Forest Representation (FoR);
step three, judging whether the FoR represents a forest only containing a single tree or not, if so, correcting the forest by using a single-tree forest correction algorithm UpdateForSingleTree () to expand the applicability of the method; if not, carrying out the fourth step;
step four, after the inter-domain routing system is attacked, a single failure autonomous domain node or a plurality of adjacent failure autonomous domain nodes are usually caused, so that judgment is carried out, and if the single failure autonomous domain node in the current inter-domain routing system fails, the fifth step is carried out; if a plurality of adjacent autonomous domain nodes fail in the current inter-domain routing system, performing a sixth step;
step five, calculating key nodes under the condition that a single autonomous domain node fails by adopting an FT key node selection algorithm KeyNodeSelectionForFT (), then implementing migration operation of the failed nodes by utilizing a basic migration algorithm FundamentTransfer (), namely FT for short, and establishing an inter-domain routing system recovery topology based on a minimum spanning tree with degree constraint;
step six, calculating key nodes under the condition that a plurality of adjacent autonomous domain nodes fail by adopting a CT key node selection algorithm KeyNodeSelectionForCT (), then implementing migration operation of the failed nodes by utilizing a complex migration algorithm ComplexTransfer (), CT for short, and establishing an inter-domain routing system recovery topology based on a minimum spanning tree with degree constraint;
further, in the step one, the Degree-constrained minimum spanning tree is a minimum spanning tree that satisfies a condition if a certain number of constraints are added to the Degree (Degree) of each vertex in the minimum spanning tree, that is, if the number of constraints is not more than a preset value. For the connectivity graph G ═ (V, E), its node set V ═ V1,v2,...,vnThe number of nodes is | V |; set of edges E ═ E1,e2,...,ekThe number of the edges is k; the weight value corresponding to each edge is wij(ii) a Let T denote the set of spanning trees for all satisfaction constraints in G. The degree-constrained minimum spanning tree DCMST mathematical model is defined as:
constraint 1: x is the number ofij∈{0,1},i,j=1,2,...n
constraint 3: 1 ≤ dgri≤dgrc,i=1,2,...,n
wherein, c (x) in the optimization objective function represents the total cost of the spanning tree; carrying out degradation processing on the constraint, and assuming that the weights of the edges are the same; constraint 1 Medium vector xijIndicating a valid edge condition between node i and node j in the graph, i.e., xij1 indicates that an edge exists between the node i and the node j; covering n-1 edges in the representation spanning tree in the constraint 2; constraint 3 middle dgriFor the value corresponding to node i, it needs to satisfy [1, dc](ii) a range requirement; constraint 4 is intended to prevent spanning tree loop problems; constraint 5 indicates that the sum of all node values is 2 (n-1).
Further, in the second step, Node Representation (NR) is proposed, which is intended to facilitate Node encoding in the graph, and for a simple undirected graph G ═ V, E, there is a forest of generation F ═ V, EF) Is an acyclic subgraph of G, one tree in F being T ═ VT,ET) Is a linking moiety of F, havingFor a graph G and one of the trees T,is composed of a node set VTA sub-graph of the generated, i.e.,all contained edges (x, y) are E and all the edges satisfy x is VTAnd y ∈ VT。
For a tree T (Root), defining the depth of a node n is the path length from n to Root, and is denoted by dp (n). N is a radical ofG(n) represents a set of nodes adjacent to node n in G. Degree of a node in G is denoted dgrG(x) And the degree of a node in T is represented as dgrT(x) In that respect The degree of one T in G is recorded as dgrG(T) is the entry of the edge set E for G belonging to VTTotal number of edges of the rendezvous node. Similarly, the number of edges in T is dgrT(T)=|VT|-1。
The NR encoding table of a tree T is an ordered list in which each node NR covers four elements (n, id, dp, dgr): respectively representing nodes (identifiable by an autonomous domain number ASN in the interdomain routing system), indexes, node depths, and node degrees. The arrangement order between the nodes NR needs to satisfy: first, the nodes of each subtree are consecutive, and second, the root of each subtree precedes its node. For a node n, according to the NR notation, id (n) indicates its index value, dp (n) and dgrG(n) respectively represent the depth and the value of the depth. For a tree T, considering the sequential characteristic of the depth-first search for the node, when implementing NR coding based on the depth-first rule, an unvisited node is found, and the node and the corresponding depth value can be added to the NR coding sequence.
The NR code FoR a spanning tree F, denoted Forest Representation (FoR), is the NR merge FoR each tree T in F. Since a forest contains multiple trees, a dual (p) can be usedT,dgrT) A tree is represented, the former representing a pointer to the tree T and the latter representing the value of the tree.
Further, in the third step, since the subsequent migration operation assumes that at least two trees exist in one forest, in order to expand the applicability of the algorithm, the forest with only one tree may be modified, and the operation is performed according to a special manner. Therefore, a single-tree forest correction algorithm UpdateForSingleTree () is provided.
Further, in the fifth step, the FT key node selection algorithm keynode selection f FT () is intended to calculate a new tree T in FTdstMiddle node T, and migrated subtree ToriginR in (1). The fundamental migration fundamental transfer () algorithm is mainly used for constructing a new forest aiming at a typical scene that a certain key node in an inter-domain routing system fails after BGP-LDoS attack and effectively meeting the mathematical model requirement of a minimum spanning tree with degree constraint.
Further, in the sixth step, the CT key node selection algorithm keynode selection nforct () is intended to calculate the migrated tree ToriginR in (1); pruning a node f; new tree TdstNode t in (1). The complex migration ComplexTransfer () algorithm is more complex relative to FT operation, and mainly aims at a situation that a plurality of adjacent autonomous domain nodes fail after an inter-domain routing system is attacked by BGP-Ldos, and utilizes a CT algorithm to generate a minimum spanning tree with the constraint of the generation degree to implement route recovery. The complex migration ComplexTransfer () algorithm can effectively meet the mathematical model requirement of the minimum spanning tree with degree constraint.
Further, in the fifth step and the sixth step, in the process of node migration and change, the process is recorded in a manner that a coding matrix is created and gradually perfected by using a node migration coding algorithm TransNodesEncode ().
The invention has the beneficial effects that:
1. the invention uses the design concept of centralized network control for reference, plans the survival route after the BGP-LDoS attacks the routing system between the domains, and constructs a new recovery topology according to the survival topology of the attacked routing system under the condition of satisfying degree constraint through a basic migration algorithm and a complex migration algorithm.
2. The routing recovery method based on the minimum spanning tree with degree constraint can effectively and simultaneously deal with single node failure scenes in an inter-domain routing system possibly caused by BGP-LDoS and multiple adjacent autonomous domain node failure scenes.
3. The invention can effectively control the aggregation of the nodes in the process of generating the minimum spanning tree, namely recovering the topology of the routing system, and avoids generating the nodes with over-high degree.
4. The route recovery method based on the minimum spanning tree with degree constraint, disclosed by the invention, has the advantages that the computational complexity can completely meet the requirement of rapid generation of the recovery route in a multi-domain environment, and the problem of high computational complexity in the aspect of generation of backup sub-graphs in the conventional multi-chain/multi-domain recovery method is solved.
5. The invention adopts a mode of generating a forest instead of a tree to find the most appropriate scheme, and simultaneously records the node migration information during topology generation through a node migration coding algorithm in the process of creating the minimum spanning tree, thereby being convenient for backtracking and error correction.
Description of the drawings:
fig. 1 is a flowchart of an inter-domain route recovery method based on a degree-constrained minimum spanning tree.
Fig. 2 is a diagram of DCMST generation times at different graph scales with a constraint of 3.
Fig. 3 is a diagram of DCMST generation times at different graph scales with a constraint of 4.
Fig. 4 is a graph of DCMST generation times at different graph scales with a restriction of 5.
Fig. 5 is a graph of DCMST generation time at different graph scales with a restriction of 6.
FIG. 6 is a DCMST generation time comparison diagram under the constraint of different degrees of B _ tpl samples.
FIG. 7 is a comparison graph of DCMST generation time under the constraint of different degrees of W _ tpl samples.
The specific implementation mode is as follows:
example (b): see fig. 1, 2, 3, 4, 5, 6 and 7.
An inter-domain route recovery method based on a minimum spanning tree with degree constraint is characterized in that an inter-domain route system subjected to BGP-LDoS attack is expressed as a spanning forest, and an inter-domain route recovery topology based on the minimum spanning tree with degree constraint is constructed under the condition that the minimum spanning tree with degree constraint is met by utilizing algorithms such as a basic migration algorithm, a complex migration algorithm, a single-tree forest correction algorithm, an FT key node selection algorithm, a CT key node selection algorithm and the like. The method comprises the following steps: step one, establishing a mathematical model of a minimum spanning tree with degree constraint;
step two, based on Node Representation (NR), coding the inter-domain routing system subjected to BGP-LDoS attack, and representing the inter-domain routing system as Forest Representation (FoR);
step three, judging whether the FoR represents a forest only containing a single tree or not, if so, correcting the forest by using a single-tree forest correction algorithm UpdateForSingleTree () to expand the applicability of the method; if not, carrying out the fourth step;
step four, after the inter-domain routing system is attacked, a single failure autonomous domain node or a plurality of adjacent failure autonomous domain nodes are usually caused, so that judgment is carried out, and if the single failure autonomous domain node in the current inter-domain routing system fails, the fifth step is carried out; if a plurality of adjacent autonomous domain nodes fail in the current inter-domain routing system, performing a sixth step;
step five, calculating key nodes under the condition that a single autonomous domain node fails by adopting an FT key node selection algorithm KeyNodeSelectionForFT (), then implementing migration operation of the failed nodes by utilizing a basic migration algorithm FundamentTransfer (), namely FT for short, and establishing an inter-domain routing system recovery topology based on a minimum spanning tree with degree constraint;
and sixthly, calculating key nodes under the condition that a plurality of adjacent autonomous domain nodes fail by adopting a CT key node selection algorithm KeyNodeSelectionForCT (), then implementing migration operation of the failed nodes by utilizing a complex migration algorithm ComplexTransfer (), which is called CT for short, and establishing an inter-domain routing system recovery topology based on a minimum spanning tree with degree constraint.
The present application is described in detail below.
In the field of computer and communication network design optimization, a Degree-Constrained Minimum Spanning Tree (DCMST) has been widely used, and its related definitions include:
spanning tree refers to a connected graph G ═ V, E if a subgraph thereof is a tree containing all vertices in GThis subgraph is called the Spanning Tree of G (ST), which satisfies the connected and acyclic properties, it should be noted that the Spanning Tree of the connected graph G is not exclusive. The minimum spanning tree means that for a weighted graph G (V, E) without directional connectivity, each side (V) is a weighted graphi,vj) The corresponding weight is wijIf the weight sum of a certain Spanning Tree is Minimum, then a Minimum Spanning Tree (MST) denoted as G is similar to the connected graph, and the Minimum Spanning Tree is not unique.
The term "Degree-constrained minimum spanning tree" means that if a certain number of degrees (Degree) for each vertex in the minimum spanning tree is limited, that is, the Degree of each vertex does not exceed a preset value, the minimum spanning tree satisfying the condition is regarded as the Degree-constrained minimum spanning tree. For the connectivity graph G ═ (V, E), its node set V ═ V1,v2,...,vnThe number of nodes is | V |; set of edges E ═ E1,e2,...,ekThe number of the edges is k; the weight value corresponding to each edge is wij(ii) a Let T denote the set of spanning trees for all satisfaction constraints in G. The DCMST mathematical model may be defined as:
constraint 1: x is the number ofij∈{0,1},i,j=1,2,...n
constraint 3: 1 ≤ dgri≤dgrc,i=1,2,...,n
wherein, c (x) in the optimization objective function represents the total cost of the spanning tree; aboutVector x in bundle 1ijIndicating a valid edge condition between node i and node j in the graph, i.e., xij1 indicates that an edge exists between the node i and the node j; covering n-1 edges in the representation spanning tree in the constraint 2; constraint 3 middle dgriFor the value corresponding to node i, it needs to satisfy [1, dc]The range requirement; constraint 4 is intended to prevent spanning tree loop problems; constraint 5 indicates that the sum of all node values is 2 (n-1). It should be noted that, considering that the typical BGP-LdoS attack at present mostly does not consider the role of the weights in the topology, the present application performs degradation processing on the above constraints, and assumes that the weights of the edges are all the same.
For the spanning tree coding, a Node Representation (NR) is proposed to facilitate the Node coding in the figure. For a simple undirected graph G ═ (V, E), there is one resulting forest F ═ (V, E)F) Is an acyclic subgraph of G, one tree in F being T ═ VT,ET) Is a linking moiety of F, havingFor a graph G and one of the trees T,is composed of a node set VTA sub-graph of the generated, i.e.,all contained edges (x, y) are E and all the edges satisfy x is VTAnd y ∈ VT。
For a tree T (Root), defining the depth of a node n is the path length from n to Root, and is denoted by dp (n). N is a radical ofG(n) represents a set of nodes adjacent to node n in G. The degree of a node in G is denoted dgrG(x) And the degree of a node in T is represented as dgrT(x) In that respect The degree of one T in G is recorded as dgrG(T) is the entry of the edge set E for G belonging to VTTotal number of edges of the rendezvous node. Similarly, the number of edges in T is dgrT(T)=|VT|-1。
NR coding table of tree TIs an ordered list, where each node NR covers four elements (n, id, dp, dgr): respectively representing nodes (identifiable by an autonomous domain number ASN in the interdomain routing system), indexes, node depths, and node degrees. The arrangement order between the nodes NR needs to satisfy: first, the nodes of each subtree are consecutive, and second, the root of each subtree precedes its node. For a node n, according to the NR notation, id (n) indicates its index value, dp (n) and dgrG(n) respectively represent the depth and the value of the depth. For a tree T, considering the sequential characteristic of the depth-first search for the node, when implementing NR coding based on the depth-first rule, an unvisited node is found, and the node and the corresponding depth value can be added to the NR coding sequence.
The NR code FoR a spanning tree F, denoted Forest Representation (FoR), is the NR combination FoR each tree T in F. Since a forest contains multiple trees, a dual (p) can be usedT,dgrT) A tree is represented, the former representing a pointer to the tree T and the latter representing the value of the tree.
For an interdomain routing system consisting of multiple autonomous domains, it corresponds to the original graph G. When DCMST is generated in response to routing failure, the process is recorded in a mode of creating and completing coding matrix step by step as the inter-domain routing nodes are continuously migrated and changed.
Node migration encoding algorithm TransNonsEncode ()
Inputting: graph G (represent an inter-domain routing system consisting of multiple autonomous domains)
And (3) outputting: migration coding matrix M of nodesn
The method comprises the following steps:
1. for a tree F in GiA certain node n in (1) creates a corresponding group number Arrayn=[i,Pi,id(n)i]I denotes the sequence number of the tree to which the node belongs, PiTo point to the tree FiPointer to NR code, last id (n)iIs the index value corresponding to n in NR;
2. suppose F1Is the first forest from G, at F1On the basis of the above-mentioned formula (I),with the cutting and migration of nodes or subtrees, the continuously generated forest sequence is marked as L ═ F1,F2,…Fi];
3. If the node n is located in a sub-tree SubTr, the slave tree FjMigration to Tree FkThen node n will be relocated and the migration encoding matrix of the node is recorded as Represents ArrayjTransposing;
for convenience of subsequent search, is tree FiList of configurations [ F1,F2,…Fi]Record from F1Process of changing to the last state. Also, due to the ordering of the configuration list, where the position of node n can be found to satisfy both F andithe predecessor exists in MnThe matrix method.
This aspect creates new forest generations by defining a fundamentals transfer (ft) and a complextransfer (ct). Specifically, the FoR of the newly generated forest F' is generated from the forest representation FoR corresponding to the existing generated forest F. The objective of the FT and CT operations is to derive T from the forestoriginSubtrees in (a set of trees) migrate to another tree Tdst。
Fundamental transfer () abbreviated as FT:
the FT is mainly used for constructing a new forest aiming at a typical scene that a certain key node in an inter-domain routing system is invalid after BGP-LDoS attack, and effectively meeting a degree constraint value.
Inputting: tree T in FoR sequence of forest ForiginAnd TdstAn index of (2); migrated subtree ToriginThe root r in (1), also referred to as a pruning node at this time; new tree TdstT, t satisfies the neighborhood of r in graph G; degree constraint value cstr
And (3) outputting: FoR of newly formed forest F
The method comprises the following steps:
1. finding ToriginThe sub-tree to which the middle pruning node r belongs corresponds to the index ranges of [ id (r), id (m)]The range covers the node r and the subsequent node m thereof, and the like, and satisfies that the value dp (r) is smaller than the subsequent node. Id (m) of the successor node can be found by sequential search, considering that the id (r) value is known;
2. temporarily creating an intermediate tree TmidThe system is used for storing nodes and subtrees in the migration process;
3. will ToriginMiddle index Range [ id (r), id (m)]Intra NR coded data, put into temporary TmidT is calculated by the method of (dp (n) -dp (r) + (dp (T) +1)midId (n) of each node n;
4. creation of one sequence T'dstComprising TdstAnd TmidAll the nodes. A new tree is generated, and a subtree with r as a root is migrated to T'dst. Only if dgr (t) is satisfied<When cstr +1, T is setmidInserted into T'dstAt the (id (t) +1) index, and then dp (t) ═ dp (t) + 1; if not, skipping to the step 4, and judging the next node after the node t; if T is already TdstIf the node is the last node, indicating that cstr is too small and finishing FT;
5. creation of sequence T'originIncluding exclusion of TmidT other than node includedoriginAfter all nodes in the node, then correcting ToriginMedium dgr (r) ═ dgr (r) -1;
6. the NR corresponding to forest F is copied to generate a new F'. The pointers to the old and the new trees in F 'are respectively recorded as pT'originAnd pT'dst;
7. Calculating dgrG(T′origin) And dgrG(T′dst) And stored in F';
8. for matrix MnMiddle T'originAnd T'dstIs modified by each node n in the set.
In the FundamentTransfer algorithm, T is assumedoriginThe root r index values id (r) and TdstThe index values id (t) of (m) are unknown, and the NR backup and any portion thereof are preservedAnd keeping the order of the nodes, namely keeping the order of the nodes in the original NR.
Complex migration ComplexTransfer (), CT for short:
the CT operation is more complex than the FT operation. Aiming at a situation that a plurality of adjacent autonomous domain nodes fail after an inter-domain routing system is attacked by BGP-Ldos, a CT algorithm generation degree constraint minimum spanning tree is designed to implement route recovery. FT operation and CT operation, which complement each other, together form a differentiated application scenario faced by DR algorithm.
Inputting: tree T in FoR sequence of forest ForiginAnd TdstAn index of (2); migrated tree ToriginR in (1); pruning a node f; new tree TdstT, t satisfies the neighborhood of r in graph G; degree constraint value cstr
And (3) outputting: FoR of newly formed forest F
The method comprises the following steps:
1. finding ToriginThe subtree to which the middle root node r belongs has the corresponding index ranges of [ id (r), id (m)]The range covers the node r and the subsequent node m thereof, and the like, and satisfies that the dp (r) value is less than the subsequent node;
2. temporarily creating two intermediate trees Tmid1And Tmid2The system is used for storing nodes and subtrees in the migration process;
3. will ToriginMiddle index Range [ id (r), id (m)]Intra NR coded data, put into temporary Tmid1T is calculated by the method of (dp (x) -dp (r) + (dp (T) +1)mid1Id (n) of each node n;
4.Toriginnodes in the path from r to f, labeled r1,r2,…,rn]Corresponding to r ═ r1And f ═ rn;
5. Find a path from r to f. Initialization Tmid2For empty NR, for each i (1 < i ≦ n), only if dgr (i) is satisfied<In cstr +1, copy with riSubtree rooted (but not including ri-1Root subtree) to Tmid2While each of the modified addition amounts to T is modified by the method of (dp (n) -dp (r) + (dp (T)) +1mid2Of node nA deep value; besides, dp (r) ═ dp (r) +1 and dp (f) ═ dp (f) — 1 are executed to correct the nodes r and f, respectively; if not satisfying dgr (i)<cstr +1, in step 5, for the next node ri+1Judging; if r isiIs already TdstIf the last node is in the middle, indicating that cstr is too small, and ending CT;
6. to be cut subtree and TdstConnected and combined to a new tree T'dstI.e. containing Tdst,Tmid1And Tmid2To [ T ]mid1Tmid2]Sequence is placed in T'dstAt (t +1), dgr (t) ═ dgr (t) +1 is performed to correct the value of t;
7. by ToriginMiddle [ T ]tmp1Ttmp2]Out node creates T'originWill be originally ToriginSubtracting 1 from the value of the forward node in the middle f;
8. copying NR corresponding to the forest F to generate a new forest structure F ', and respectively recording pointers pointing to new and old trees in F ' as pT 'originAnd pT'dst(ii) a Calculating dgrG(T′origin) And dgrG(T′dst) And are stored in F';
9. for matrix MnMiddle T'originAnd T'dstIs modified by each node n in the set.
Single-tree forest correction algorithm UpdateForSingleTree ()
The algorithm assumes that there are at least two trees in a forest when applying both CT and FT. To extend the applicability of the algorithm, a forest with only one tree may be modified, and the operation performed in a particular manner.
Inputting: unique tree T of forest Forigin
And (3) outputting: FoR of newly formed forest F
The method comprises the following steps:
1. building a tree TsupAssistance is made, assuming that the tree contains only one node n, this node being the caseAnd n and ToriginEach node in the network maintainsConnecting;
2. let TdstIs TsupFT is performed, thereby T can be convertedoriginMiddle one tree becomes TsupSuccessor of n;
3. the original tree is changed from the root tree of n by FT or CT operation, so as to generate a new forest F'.
FT Key node selection KeyNodeSelectionForFT ()
Inputting: FoR sequence of forest F
And (3) outputting: new tree T in FTdstMiddle node T, migrated subtree ToriginRoot of Chinese Greek
The method comprises the following steps:
1. randomly searching for a T tree in F to satisfy dgrG(T) greater than dgrT(T), let ToriginIs T. If the forest is not found, the diagram G is a single forest, and the process is stopped;
2. from ToriginRandomly determining a non-root node r, dgrG(r) is greater than dgrT(r);
3. From NG(r) randomly selecting a node n if the edge (n, r) does not belong to ETIf the value is n, the step is not carried out; then determining the index id (t) of the node t in the forest F by searching the matrix;
4. if T belongs to ToriginExecuting a single-tree forest correction algorithm; otherwise, FT is performed.
CT Key node selection KeyNodeSelectionForCT ()
Inputting: FoR sequence of forest F
And (3) outputting: migrated tree ToriginR in (1); pruning a node f; new tree TdstNode t in (1)
The method comprises the following steps:
1. randomly searching for a T tree in F to satisfy dgrG(T) greater than dgrT(T), let ToriginIs T. If the forest can not be found, the graph G is a single forest, and the process is stopped;
2. from ToriginRandomly determining a non-root node r, dgrG(r) is greater than dgrT(r);
3. Looking for r to ToriginPath of root, let i be 1 and riIs r, from T in the direction of the rootoriginStarting traversal with the step length of 1, judging each node n in the traversal process, if dp (n) is less than dp (r)i) Then let ri+1Is n. If i>2, then in [2, …, i-1 ]]Randomly selecting j within the range, and making f be rj(ii) a If the whole path only comprises a node r and a root, making f be r;
4. from NG(r) randomly selecting a node n if the edge (n, f) does not belong to ETIf yes, making t be n, otherwise, repeating the step; then, determining the index id (t) of the node t in the forest F by searching the matrix;
5. if T belongs to ToriginExecuting a single-tree forest correction algorithm; otherwise, FT is performed.
In the following description, the following embodiments are described, in which a tournament selection method is used to select a child, i.e., a spanning tree, and operand selection is 2, which corresponds to the FT migration operation and the CT migration operation, respectively. The routing failure recovery method (tree-constrained minimum spanning tree based failure recovery) based on the minimum spanning tree proposed herein is abbreviated as DR.
Example one
A BRITE topology generator is utilized to generate a random graph based on a GLP model, the random graph represents AS-level simulation topology in an interdomain routing system, and the number of nodes of the random graph is respectively set to be 10,50,100,200,400,600,800 and 1000 in a regional interdomain routing system established by taking a small-scale multi-autonomous-domain community AS a unit.
And simulating BGP-LDoS attack to implement attack on the random graph, and generating DCMST by respectively using the DR algorithm and the classical ESR algorithm provided by the application aiming at the survival nodes and the links to serve as recovery topology after the inter-domain routing system is attacked. The simulation environment is Window 10, Intel i 56200U, 16G memory. In order to be able to efficiently control the aggregation of nodes in the recovery topology, the range of values of the nodes of the generation tree is limited to [3,6 ]; the average nodularity of the random graph generated by the GLP model is 4.1. ESR, as a classical spanning tree algorithm, produces a new tree from edge set operations with specific swaps and variances. In the ESR algorithm, both the crossover probability and the mutation probability are 0.8.
Fig. 2 to 5 show a comparison of the time taken to generate DCMST by the ESR method and the DR method, respectively, for random graphs containing different node numbers, for constraint values of 3 to 6, respectively. As can be seen from the figures, in both methods, along with the relaxation of the degree value constraint, that is, the generation time is relatively shorter as the constraint value is higher, but the DCMST generation time difference corresponding to the same topology scale is smaller as a whole, for example, in fig. 2 and 5, the generation time difference is only 0.95 seconds when the degree constraint is 3 and 6 respectively based on the DR method in the random topology including 1000 nodes. In addition, the DR method proposed by the present application has a quite significant performance advantage relative to the ESR method, and the performance advantage is more prominent with the increase of the topological scale, for example, in fig. 5, when the topological scale is 600, the time gap for generating DCMST by using the DR method and the ESR method is 5.68 seconds; when the topology size is 1000, the time gap rises to 22.41 seconds. Thirdly, compared with the theoretical analysis result of the complexity of time in the previous section, the DR method has better performance under the simulation condition of the random graph.
Example two
And carrying out simulation verification by using the true Internet AS-Level topology from CAIDA, and respectively obtaining sample topologies from BGP _ tables and WHOIS. BGP _ tables and WHOIS raw data sets both contain 30,000+ nodes, and the topology covering the first 3000 AS nodes is extracted from the two raw data sets for simulation, respectively, considering that the actual inter-domain route recovery mechanism of the internet needs to be implemented within a certain range. Wherein, the local topology taken from BGP _ tables is named as B _ tpl, and the average value is 2.51; the local topology taken from WHOIS is named W tpl with an average value of 6.53.
Similar to the embodiment, the BGP-LDoS is simulated to attack the B _ tpl and W _ tpl topologies, and for surviving nodes and links, DCMST is generated by using the DR algorithm and the classical ESR algorithm proposed in the present application, respectively, as a recovery topology after the inter-domain routing system attacks. The simulation environment and ESR settings are consistent with the example, and are also limited to a spanning tree node value range of [3,6 ].
FIG. 6 shows the time comparison of DCMST generated by using DR algorithm and ESR algorithm within the range of [3-6] for B _ tpl samples. It can be seen that under the two methods, as the value constraint is relaxed, the generation time of DCMST is gradually reduced as a whole, wherein the value constraint 5 is slightly higher than the value constraint 4, but the overall trend is still reduced. Compared with an ESR algorithm, the DR algorithm provided by the application has relatively obvious advantages, and the DCMST generation time is greatly reduced.
FIG. 7 is a time comparison of DCMST generated using two algorithms within a range of degrees constraint [3-6] for W _ tpl samples. Similar to the simulation result of the B _ tpl sample, on one hand, the generation time of the DCMST is also gradually reduced along with the relaxation of the value constraint condition; on the other hand, the DR algorithm has significant performance advantages over ESR. Comparing fig. 7 with fig. 6, it can be seen that, under the same degree constraint condition, the DCMST generation time under B _ tpl sample is slightly shorter than the generation time under W _ tpl sample, and this phenomenon should occur because the average node degree in B _ tpl is smaller than the average node degree in W _ tpl, so only a relatively small number of spanning tree migration operations are required, and the overall time consumption is saved.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and any simple modification, equivalent change and modification made to the above embodiment according to the technical spirit of the present invention are within the scope of the technical solution of the present invention.
Claims (5)
1. An inter-domain route recovery method based on a degree constraint minimum spanning tree is characterized in that: step one, establishing a mathematical model of a minimum spanning tree with degree constraint;
step two, based on Node Representation (NR), coding the inter-domain routing system subjected to BGP-LDoS attack, and representing the inter-domain routing system as Forest Representation (FoR);
step three, judging whether the FoR represents a forest only containing a single tree or not, if so, correcting the forest by using a special implementation mode in order to expand the applicability of the method; if the forest is not a single-tree forest, directly carrying out the fourth step;
step four, after the inter-domain routing system attacks, a single failure autonomous domain node or a plurality of adjacent failure autonomous domain nodes are usually caused, so that judgment is carried out, and if the single failure autonomous domain node in the current inter-domain routing system fails, the fifth step is carried out; if the current inter-domain routing system has the defects that a plurality of adjacent autonomous domain nodes fail, performing a sixth step;
step five, calculating key nodes under the condition that a single autonomous domain node is invalid by adopting an FT key node selection algorithm KeyNodeSelectionForFT (), then implementing migration operation of the invalid nodes by utilizing a basic migration algorithm FundamentTransfer (), namely FT for short, and establishing an inter-domain routing system recovery topology based on a minimum spanning tree with degree constraint;
step six, calculating key nodes under the condition that a plurality of adjacent autonomous domain nodes fail by adopting a CT key node selection algorithm KeyNodeSelectionForCT (), then implementing migration operation of the failed nodes by utilizing a complex migration algorithm ComplexTransfer (), CT for short, and establishing an inter-domain routing system recovery topology based on a minimum spanning tree with degree constraint;
in the first step, the Degree-constrained minimum spanning tree is a minimum spanning tree that satisfies a condition when a certain number of degrees (Degree) of each vertex in the minimum spanning tree is added, that is, when the Degree of each vertex in the minimum spanning tree does not exceed a preset value, and a node set V ═ { V, E) of the minimum spanning tree is set as the Degree-constrained minimum spanning tree, and a connected graph G ═ V, E is set as (V, E)1,v2,...,vnThe number of nodes is | V |; set of edges E ═ E1,e2,...,ekThe number of the edges is k; the weight value corresponding to each edge is wij(ii) a T represents a spanning tree set of all satisfaction degree constraints in G; the degree-constrained minimum spanning tree DCMST mathematical model is defined as:
constraint 1: x is the number ofij∈{0,1},i,j=1,2,...n
constraint 3: 1 ≤ dgri≤dgrc,i=1,2,...,n
wherein, c (x) in the optimization objective function represents the total cost of the spanning tree; carrying out degradation processing on the constraint, and assuming that the weights of the edges are the same; constraint 1 Medium vector xijIndicating a valid edge condition between node i and node j in the graph, i.e., xij1 indicates that an edge exists between the node i and the node j; covering n-1 edges in the representation spanning tree in the constraint 2; constraint 3 middle dgriFor the value corresponding to node i, it needs to satisfy [1, dc]The range requirement; constraint 4 is intended to prevent spanning tree loop problems; constraint 5 indicates that the sum of all node values is 2 (n-1);
in the third step, because the subsequent migration operation considers that at least two trees exist in one forest, in order to expand the applicability of the algorithm, the forest with only one tree is corrected, and the operation is implemented according to a single-tree forest correction algorithm UpdateForSingleTree ().
2. The inter-domain route recovery method based on the degree-constrained minimum spanning tree of claim 1, wherein: in the second step, Node Representation (NR) is proposed, which is intended to facilitate Node encoding in the graph, and for a simple undirected graph G ═ V, E, there is a generated forest F ═ V, EF) Is an acyclic subgraph of G, one tree in F being T ═ VT,ET) Is a linking moiety of F, havingFor a graph G andin the case of one tree T, the tree T,is composed of a node set VTA sub-graph of the generated, i.e.,all contained edges (x, y) are E and all the edges satisfy x is VTAnd y ∈ VT;
For a tree T (Root), the depth of a node n refers to the path length from n to Root, and is denoted as dp (n); n is a radical ofG(n) represents a set of nodes adjacent to node n in G; degree of a node in G is denoted dgrG(x) And the degree of a node in T is represented as dgrT(x) (ii) a The degree of one T in G is recorded as dgrG(T) is the entry of the edge set E for G belonging to VTThe total number of edges of the rendezvous node; similarly, the number of edges in T is dgrT(T)=|VT|-1;
The NR encoding table of a tree T is an ordered list in which each node NR covers four elements (n, id, dp, dgr): respectively representing nodes (which can be identified by an autonomous domain number ASN in an inter-domain routing system), indexes, node depths and node values; the arrangement order between the nodes NR needs to satisfy: firstly, the nodes of each subtree are continuous, and secondly, the root of each subtree is arranged in front of the nodes; for a node n, according to the NR notation, id (n) indicates its index value, dp (n) and dgrG(n) respectively representing the depth and the value of the depth; for a tree T, because of the sequential characteristic of depth-first search for nodes, when NR coding is implemented based on the depth-first rule, an unvisited node is searched, and the node and the corresponding depth value and the corresponding value can be added into an NR coding sequence;
encoding NR of a spanning tree F, namely representing Forest (FoR), and merging NR of each tree T in the F; since a forest contains multiple trees, a dual (p) can be usedT,dgrT) A tree is represented, the former representing a pointer to the tree T and the latter representing the value of the tree.
3. The inter-domain route recovery method based on the degree-constrained minimum spanning tree of claim 1, wherein: in the fifth step, the FT key node selection algorithm KeyNodeSelectionForFT () is used for calculating a new tree T in FTdstMiddle node T, and migrated subtree ToriginR in (1); the fundamental migration fundamental transfer () algorithm is mainly used for constructing a new forest aiming at a typical scene that a certain key node in an inter-domain routing system fails after BGP-LDoS attack and effectively meeting the mathematical model requirement of a minimum spanning tree with degree constraint.
4. The inter-domain route recovery method based on the degree-constrained minimum spanning tree of claim 1, wherein: in the sixth step, the CT key node selection algorithm keynode selection nfortoct () is intended to calculate the migrated tree ToriginR in (1); pruning a node f; new tree TdstNode t in (1); the complex migration ComplexTransfer () algorithm is more complex relative to FT operation, and mainly aims at a situation that a plurality of adjacent autonomous domain nodes fail after an inter-domain routing system is attacked by BGP-Ldos, and utilizes a CT algorithm to generate a minimum spanning tree with a constrained degree so as to implement route recovery; the complex migration ComplexTransfer () algorithm effectively satisfies the mathematical model requirements of the minimum spanning tree of the degree constraint.
5. The inter-domain route recovery method based on the degree-constrained minimum spanning tree of claim 1, wherein: in the fifth step and the sixth step, in the process of node migration and change, the process is recorded in a mode of creating and gradually perfecting a coding matrix by using a node migration coding algorithm TransNodeS Encode ().
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910985081.8A CN111131028B (en) | 2019-10-16 | 2019-10-16 | Inter-domain route recovery method based on minimum spanning tree of degree constraint |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910985081.8A CN111131028B (en) | 2019-10-16 | 2019-10-16 | Inter-domain route recovery method based on minimum spanning tree of degree constraint |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111131028A CN111131028A (en) | 2020-05-08 |
CN111131028B true CN111131028B (en) | 2021-09-21 |
Family
ID=70495370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910985081.8A Active CN111131028B (en) | 2019-10-16 | 2019-10-16 | Inter-domain route recovery method based on minimum spanning tree of degree constraint |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111131028B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116032727B (en) * | 2021-10-25 | 2024-04-09 | 中国科学院沈阳自动化研究所 | Electric power internet of things sensing layer self-repairing method based on regional collaboration |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1798051A (en) * | 2004-12-24 | 2006-07-05 | 中兴通讯股份有限公司 | Method of network fault recovery crossing over connections in multiple domains |
US7180866B1 (en) * | 2002-07-11 | 2007-02-20 | Nortel Networks Limited | Rerouting in connection-oriented communication networks and communication systems |
CN101610433A (en) * | 2009-07-10 | 2009-12-23 | 北京邮电大学 | The multi-constraint condition routing selection method that a kind of support policy is resolved |
CN102065006A (en) * | 2010-12-01 | 2011-05-18 | 电子科技大学 | Method for recovering inter-domain failure of cross-domain label switched path |
CN104301215A (en) * | 2014-10-10 | 2015-01-21 | 北京邮电大学 | Construction method of overlay network |
WO2015051839A1 (en) * | 2013-10-09 | 2015-04-16 | Telefonaktiebolaget L M Ericsson (Publ) | Routing of point-to-multipoint services in a multi-domain network |
CN105072660A (en) * | 2015-06-24 | 2015-11-18 | 国家电网公司 | Routing method of wireless sensor and actuator network for fire protection |
CN105978711A (en) * | 2016-04-29 | 2016-09-28 | 南京邮电大学 | Best switching edge searching method based on minimum spanning tree |
CN107438026A (en) * | 2016-05-27 | 2017-12-05 | 任子行网络技术股份有限公司 | The failure recovery method and apparatus of inter-domain routing system |
CN107483248A (en) * | 2017-08-17 | 2017-12-15 | 广东工业大学 | A kind of constraint minimum spanning tree Topology Control Algorithm based on wireless sensor network |
CN109474476A (en) * | 2018-12-07 | 2019-03-15 | 天津津航计算技术研究所 | Wireless sensor network fault recovery system based on minimum spanning tree |
CN111417037A (en) * | 2019-01-07 | 2020-07-14 | 中国移动通信有限公司研究院 | Management and control system of optical transport network |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9219682B2 (en) * | 2012-11-05 | 2015-12-22 | Cisco Technology, Inc. | Mintree-based routing in highly constrained networks |
-
2019
- 2019-10-16 CN CN201910985081.8A patent/CN111131028B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7180866B1 (en) * | 2002-07-11 | 2007-02-20 | Nortel Networks Limited | Rerouting in connection-oriented communication networks and communication systems |
CN1798051A (en) * | 2004-12-24 | 2006-07-05 | 中兴通讯股份有限公司 | Method of network fault recovery crossing over connections in multiple domains |
CN101610433A (en) * | 2009-07-10 | 2009-12-23 | 北京邮电大学 | The multi-constraint condition routing selection method that a kind of support policy is resolved |
CN102065006A (en) * | 2010-12-01 | 2011-05-18 | 电子科技大学 | Method for recovering inter-domain failure of cross-domain label switched path |
WO2015051839A1 (en) * | 2013-10-09 | 2015-04-16 | Telefonaktiebolaget L M Ericsson (Publ) | Routing of point-to-multipoint services in a multi-domain network |
CN104301215A (en) * | 2014-10-10 | 2015-01-21 | 北京邮电大学 | Construction method of overlay network |
CN105072660A (en) * | 2015-06-24 | 2015-11-18 | 国家电网公司 | Routing method of wireless sensor and actuator network for fire protection |
CN105978711A (en) * | 2016-04-29 | 2016-09-28 | 南京邮电大学 | Best switching edge searching method based on minimum spanning tree |
CN107438026A (en) * | 2016-05-27 | 2017-12-05 | 任子行网络技术股份有限公司 | The failure recovery method and apparatus of inter-domain routing system |
CN107483248A (en) * | 2017-08-17 | 2017-12-15 | 广东工业大学 | A kind of constraint minimum spanning tree Topology Control Algorithm based on wireless sensor network |
CN109474476A (en) * | 2018-12-07 | 2019-03-15 | 天津津航计算技术研究所 | Wireless sensor network fault recovery system based on minimum spanning tree |
CN111417037A (en) * | 2019-01-07 | 2020-07-14 | 中国移动通信有限公司研究院 | Management and control system of optical transport network |
Non-Patent Citations (5)
Title |
---|
A routing?recovery method based on structure properties and centralized control for inter domain routing system;Yi Guo;Juwei Yan;Liancheng Zhang;Han Qiu;《2017 IEEE 17th International Conference on Communication Technology (ICCT)》;20180517;全文 * |
Laura Anton-Sanchez;Concha Bielza;Pedro Larrañaga.Network design through forests with degree- and role-constrained minimum spanning trees.《Journal of Heuristics》.2017, * |
一种基于突变理论的域间路由系统BGP-LDoS攻击检测方法;苗甫; 王振兴; 郭毅; 张连成; 王禹;《信息工程大学学报》;20190815;全文 * |
一种采用混合抗干扰方法的路由恢复机制;孙子文; 张炎棋; 徐宜敏;《系统仿真学报》;20190603;全文 * |
域间网络保护路由;袁静; 陈凯; 胡成臣; 陈曦;《中南大学学报(自然科学版)》;20150826;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111131028A (en) | 2020-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Papadopoulos et al. | Network mapping by replaying hyperbolic growth | |
Papadopoulos et al. | Network geometry inference using common neighbors | |
Pandurangan et al. | A time-and message-optimal distributed algorithm for minimum spanning trees | |
Ziavras | RH: a versatile family of reduced hypercube interconnection networks | |
CA2417864C (en) | Method and apparatus for selecting maximally disjoint shortest paths in a network | |
CN105721301B (en) | Support the route computing method of confidence level classification | |
Goodrich et al. | Succinct greedy geometric routing in the Euclidean plane | |
CN105978711B (en) | A kind of best exchange side lookup method based on minimum spanning tree | |
CN112202703A (en) | Block chain storage optimization method based on redundant remainder system | |
CN111131028B (en) | Inter-domain route recovery method based on minimum spanning tree of degree constraint | |
CN116628083B (en) | Block chain transaction data capacity expansion storage method and system | |
Ilcinkas et al. | The cost of monotonicity in distributed graph searching | |
CN110071871A (en) | A kind of large model pool ip address matching process | |
WO2015131840A1 (en) | Detection method and apparatus of mimo system | |
Duchon et al. | Towards small world emergence | |
Fu et al. | Cyclic-cubes: A new family of interconnection networks of even fixed-degrees | |
CN107749801A (en) | A kind of virtual network function laying method based on population Incremental Learning Algorithm | |
Duan et al. | Connectivity oracles for failure prone graphs | |
Przewozniczek et al. | Empirical problem decomposition—the key to the evolutionary effectiveness in solving a large-scale non-binary discrete real-world problem | |
Castañeda et al. | Compact routing messages in self-healing trees | |
Detzner et al. | Low-Cost Search in Tree-Structured P2P Overlays: The Null-Balance Benefit | |
Elshqeirat et al. | Dynamic programming for minimal cost topology with two terminal reliability constraint | |
CN105812258B (en) | A kind of data processing method and device | |
CN110019981B (en) | Directed super-edge propagation method integrating unsupervised learning and network out-degree | |
Chiu et al. | An adaptive heuristic algorithm with the probabilistic safety vector for fault-tolerant routing on the (n, k)-star graph |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |